293 resultados para customer loyalty programs
Resumo:
The article explains and compares sustainability programs available for use by residential and commercial premises; as well as the respective legal tenure frameworks of commercial and residential tenancies. It identifies that while the desire of commercial tenants drive the participation by landlords in these programs, residential tenants appear to be ignorant of sustainable measures. The article contends that the reason for this difference is rooted in the legal and social status of residential tenants. It explores the impact that secure tenure may have in promoting residential sustainability programs and concludes by observing that the lack of involvement of residential tenants in programs stems from the absence of tenure security, which prevents any long term cooperation between the parties.
Resumo:
Customer relationship marketing (CRM) initiatives are increasingly being adopted by businesses in the attempt to enhance brand loyalty and stimulate repeat purchases. The purpose of this study was to examine the extent to which destination marketing organisations (DMOs) around the world have developed a visitor relationship marketing (VRM) orientation. The proposition underpinning the study is that maintaining meaningful dialogue with previous visitors in some markets would represent a more efficient use of resources than above the line advertising to attract new visitors. Importance-performance analysis was utilised to measure destination marketers’ perceptions of the efficacy of CRM initiatives, and then rate their own organisation’s performance across the same range of initiatives. A key finding was that mean importance was higher than perceived performance for every item. While the small sample limits generalisability, in general there are appears to be a lack of strategic intent by DMOs to invest in VRM.
Resumo:
Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.
Resumo:
Property law is one of the key elements in any property-based degree program. In particular, an understanding of 'property law' is one of the required knowledge fields for inclusion in property programs accredited by professional institutes such as the Royal Institution of Chartered Surveyors, the Appraisal Institute and the Australian Property Institute. Despite the importance of property law as a cornerstone element of all property programs this aspect of the program is often approached from a more generic legal perspective with teaching resources used and pedagogical approach more aligned to the study of law that property. The specificity of this type of program is rarely adequately acknowledged. The question arises as to what the study of 'property law' entails and what the composition of a 'property law' subject should be. Replicating the methodology used by Placid and Weeks (2009) in their examination of the current composition of real estate law courses in the United States, this paper examines the current composition and pedagogical approach adopted by Australian universities based on the study of three Queensland property programs. In particular the curriculum, teaching resources used, assessment and engagement strategies are considered with a view to making improvements to the way these property law courses can be more effectively tailored to property students. It is anticipated that the outcomes of this paper will be of interest to all academics who are responsible for developing and delivering property law subjects and those who manage property programs in Australia and internationally.
Resumo:
What opportunities does a channel like Twitter offer to libraries, beyond the realm of marketing? We would like to highlight three roles for Twitter in the academic library environment: Twitter as a service delivery and service recovery channel; Twitter as a community builder; Twitter as a site for information experience.
Resumo:
In Australia, as elsewhere, universities are being encouraged to grow their postgraduate research candidature base while at the same time there is increasing pressure on resources with which to manage the burgeoning groups. In this environment HDR supervision strategies are seen as increasingly important as research managers seek the best possible ‘fit’ for an applicant: the candidate who will provide a sound return on investment and demonstrate endurance in the pursuit of a timely completion. As research managers know, the admissions process can be a risky business. The process may be tested further in the context of the new models of doctoral cohort supervision that are being discussed in the higher degree research management sector. The focus of this paper is an examination of the results of investigations of two models of postgraduate cohort supervision in the creative arts Master of Arts research program at QUT with a view to identifying attributes that may be useful for the formation of cohort models of supervision in the doctoral area.
Resumo:
I put my abstract in for this conference back in March, based on some evaluation work I had been doing in 2010 with my colleague Professor Greg Hearn for the 3C Regional Writing NeoGreography Project. I had been swapping notes with a colleague from the Smithsonian’s Centre for Folklife and Cultural Heritage about their evaluation work, and stuck inside during the rains of January, I decided to apply for a Qld Smithsonian fellowship based on the quandary of evaluation-particular in public histories (oral histories) and digital storytelling. In July I was awarded the fellowship, so I have tweaked my presentation to talk about what we hope to do with this collaboration, to propel the importance placed on evaluation in public arts programs in Qld and beyond.
Resumo:
Higher Education's widening participation agenda prioritises improving access to university for low-SES students. Parallel with these ambitious national participation targets, is the challenge for universities to significantly improve student retention rates; hence, the need to implement strategies aimed to improve the quality of the student learning experience and build a 'sense of belonging'. Within the framework of the First Year Experience Program, Queensland University of Technology has embarked on establishing a whole-of-institution model for peer programs that aims to: 1) improve the student learning experience and outcomes; and, 2) establish quality assured and sustainable programs. This paper reports on the maturation university-wide peer program strategy and considers the challenges of implementing, evaluating and resourcing a sustainable and inclusive approach to peer programs.
Resumo:
In a commercial environment, it is advantageous to know how long it takes customers to move between different regions, how long they spend in each region, and where they are likely to go as they move from one location to another. Presently, these measures can only be determined manually, or through the use of hardware tags (i.e. RFID). Soft biometrics are characteristics that can be used to describe, but not uniquely identify an individual. They include traits such as height, weight, gender, hair, skin and clothing colour. Unlike traditional biometrics, soft biometrics can be acquired by surveillance cameras at range without any user cooperation. While these traits cannot provide robust authentication, they can be used to provide identification at long range, and aid in object tracking and detection in disjoint camera networks. In this chapter we propose using colour, height and luggage soft biometrics to determine operational statistics relating to how people move through a space. A novel average soft biometric is used to locate people who look distinct, and these people are then detected at various locations within a disjoint camera network to gradually obtain operational statistics
Resumo:
Baseline monitoring of groundwater quality aims to characterize the ambient condition of the resource and identify spatial or temporal trends. Sites comprising any baseline monitoring network must be selected to provide a representative perspective of groundwater quality across the aquifer(s) of interest. Hierarchical cluster analysis (HCA) has been used as a means of assessing the representativeness of a groundwater quality monitoring network, using example datasets from New Zealand. HCA allows New Zealand's national and regional monitoring networks to be compared in terms of the number of water-quality categories identified in each network, the hydrochemistry at the centroids of these water-quality categories, the proportions of monitoring sites assigned to each water-quality category, and the range of concentrations for each analyte within each water-quality category. Through the HCA approach, the National Groundwater Monitoring Programme (117 sites) is shown to provide a highly representative perspective of groundwater quality across New Zealand, relative to the amalgamated regional monitoring networks operated by 15 different regional authorities (680 sites have sufficient data for inclusion in HCA). This methodology can be applied to evaluate the representativeness of any subset of monitoring sites taken from a larger network.
Resumo:
Enterprise Systems (ES) have emerged as possibly the most important and challenging development in the corporate use of information technology in the last decade. Organizations have invested heavily in these large, integrated application software suites expecting improvments in; business processes, management of expenditure, customer service, and more generally, competitiveness, improved access to better information/knowledge (i.e., business intelligence and analytics). Forrester survey data consistently shows that investment in ES and enterprise applications in general remains the top IT spending priority, with the ES market estimated at $38 billion and predicted to grow at a steady rate of 6.9%, reaching $50 billion by 2012 (Wang & Hamerman, 2008). Yet, organizations have failed to realize all the anticipated benefits. One of the key reasons is the inability of employees to properly utilize the capabilities of the enterprise systems to complete the work and extract information critical to decision making. In response, universities (tertiary institutes) have developed academic programs aimed at addressing the skill gaps. In parallel with the proliferation of ES, there has been growing recognition of the importance of Teaching Enterprise Systems at tertiary education institutes. Many academic papers have discused the important role of Enterprise System curricula at tertiary education institutes (Ask, 2008; Hawking, 2004; Stewart, 2001), where the teaching philosophises, teaching approaches and challenges in Enterprise Systems education were discussed. Following the global trends, tertiary institutes in the Pacific-Asian region commenced introducing Enterprise System curricula in late 1990s with a range of subjects (a subject represents a single unit, rather than a collection of units; which we refer to as a course) in faculties / schools / departments of Information Technology, Business and in some cases in Engineering. Many tertiary educations commenced their initial subject offers around four salient concepts of Enterprise Systems: (1) Enterprise Systems implementations, (2) Introductions to core modules of Enterprise Systems, (3) Application customization using a programming language (e.g. ABAP) and (4) Systems Administration. While universities have come a long way in developing curricula in the enterprise system area, many obstacles remain: high cost of technology, qualified faculty to teach, lack of teaching materials, etc.
Resumo:
The need for social marketing research in the area of breastfeeding is highlighted by the failure of campaigns to increase breastfeeding rates over the past two decades in developed countries. This is despite evidence of the health benefits of longer breastfeeding duration to both baby and mother, and the high levels of expenditure on these campaigns. Whilst past campaign approaches typically focus on baby-oriented factors, breastfeeding is a complex behaviour that for many women involves barriers that influence their commitment to continued breastfeeding. Using social marketing, this research investigates the role of mother-centred factors on loyalty to breastfeeding. A sample of 405 Australian women completed an online survey. The data were analysed using structural equation modelling, which revealed that mother-oriented, rather than baby-oriented, factors influence attitudinal and behavioural loyalty to breastfeeding.
Resumo:
This paper demonstrates how social marketing insights were used to influence women’s loyalty to breastfeeding. The paper reports on a social marketing campaign undertaken by the Australian Breastfeeding Association and a government health department, which used a product development strategy in order to increase breastfeeding loyalty. Seeking new approaches to support breastfeeding behaviors is critical and timely, because while initiation rates of breastfeeding are high in developed countries such as the UK, Australia, Canada, and the USA, duration rates are significantly lower. Results indicate that a product focused strategy influences pregnant women’s loyalty to exclusively breastfeeding.